Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy
Title | Enhanced p-Sensitive k-Anonymity Models for Achieving Better Privacy |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Wang, N., Song, H., Luo, T., Sun, J., Li, J. |
Conference Name | 2020 IEEE/CIC International Conference on Communications in China (ICCC) |
Date Published | Aug. 2020 |
Publisher | IEEE |
ISBN Number | 978-1-7281-7327-6 |
Keywords | anonymity, clustering, Clustering algorithms, composability, data anonymity, Data models, data privacy, data publishing, data utility, enhanced anonymous models, enhanced p-sensitive k-anonymity models, faces, homogeneous attacks, Human Behavior, Metrics, one size fits all unified privacy protection level, Partitioning algorithms, personalized privacy protection, personalized protection characteristic, privacy, Privacy Requirements, pubcrawl, Publishing, resilience, Resiliency, Resists, sensitive attacks, sensitive groups, skew attacks |
Abstract | To our best knowledge, the p-sensitive k-anonymity model is a sophisticated model to resist linking attacks and homogeneous attacks in data publishing. However, if the distribution of sensitive values is skew, the model is difficult to defend against skew attacks and even faces sensitive attacks. In practice, the privacy requirements of different sensitive values are not always identical. The "one size fits all" unified privacy protection level may cause unnecessary information loss. To address these problems, the paper quantifies privacy requirements with the concept of IDF and concerns more about sensitive groups. Two enhanced anonymous models with personalized protection characteristic, that is, (p,aisg) -sensitive k-anonymity model and (pi,aisg)-sensitive k-anonymity model, are then proposed to resist skew attacks and sensitive attacks. Furthermore, two clustering algorithms with global search and local search are designed to implement our models. Experimental results show that the two enhanced models have outstanding advantages in better privacy at the expense of a little data utility. |
URL | https://ieeexplore.ieee.org/document/9238801 |
DOI | 10.1109/ICCC49849.2020.9238801 |
Citation Key | wang_enhanced_2020 |
- Metrics
- skew attacks
- sensitive groups
- sensitive attacks
- Resists
- Resiliency
- resilience
- Publishing
- pubcrawl
- Privacy Requirements
- privacy
- personalized protection characteristic
- personalized privacy protection
- Partitioning algorithms
- one size fits all unified privacy protection level
- anonymity
- Human behavior
- homogeneous attacks
- faces
- enhanced p-sensitive k-anonymity models
- enhanced anonymous models
- data utility
- data publishing
- data privacy
- Data models
- data anonymity
- composability
- Clustering algorithms
- clustering